Chapter 4: The Medium Access Layer

Size: px
Start display at page:

Download "Chapter 4: The Medium Access Layer"

Transcription

1 Chapter 4: The Medium Access Layer Computer Networks Maccabe Computer Science Department The University of New Mexico September 2002

2 Medium Access Layer Point-to-point versus broadcast networks Broadcast multiaccess channels random access channels Arbitrate contention General coverage of LANs Chapter 4 p.2/69

3 Topics Arbitrating access to broadcast networks Channel Allocation Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth Data Link Layer Switching Chapter 4 p.3/69

4 Channel Allocation Static Allocation FDM and TDM are examples of static allocation Traffic is bursty, mean to peak ratio of 1:1000 Mean delay: where T 1 µc λ C is channel capacity in bps λ is arrival rate in frames/sec 1 µ is the mean frame length in bits/frame µc is the service rate Replace channel with N C 1 T FDM µ C N λ N bps channels N N µc λ NT Chapter 4 p.4/69

5 Channel Allocation Dynamic Allocation Station Model: N independent stations probability of frame generation in interval t is λ t station blocks until frame is transmitted Single Channel no external channels Collision simultaneous transmission results in garbled signal Time Continuous Slotted time is divided into discrete intervals Carrier No sense channels transmit then look for collisions Sense stations wait while channel is busy frame transmission can start at any time Chapter 4 p.5/69

6 Topics Arbitrating access to broadcast networks Channel Allocation Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth Data Link Layer Switching Chapter 4 p.6/69

7 MAC Protocols ALOHA Carrier Sensed Multiple Access (CSMA) Collision-Free Protocols Limited-Contention Protocols (skip) Wavelength Division Multiple Access Protocols (skip) Wireless LAN Protocols Chapter 4 p.7/69

8 ALOHA Pure ALOHA Stations transmit and look for collisions (could wait for ACKs if unable to listen while transmitting) Random time for backoff (avoids lockstep) User A B C D E Time Chapter 4 p.8/69

9 ALOHA Efficiency Let t be the time to transmit a frame Vulnerable period for a frame is 2t Collides with the start of the shaded frame t Collides with the end of the shaded frame t o t o + t t o + 2t t o + 3t Time Vulnerable Chapter 4 p.9/69

10 ALOHA Efficiency Let G be the mean transmissions (old and new) per frame time Probability of k frames generated during a frame time is: G k e G Pr[k] k! 2G frames in an interval of length 2t Throughput is (offered load times probability of no collisions) S Ge 2G Chapter 4 p.10/69

11 ALOHA Efficiency S (throughput per frame time) 0.40 Slotted ALOHA: S = Ge G Pure ALOHA: S = Ge 2G G (attempts per packet time) Chapter 4 p.11/69

12 ALOHA Slotted Can only start at the beginning of a slot Reduces vulnerability by 1/2 S Probability of a collision is 1 e G Probability of requiring k attempts P k e G 1 e G Expected number of transmissions k 1 Ge G E k 1kP k k 1 ke G 1 e G k 1 e G Chapter 4 p.12/69

13 Carrier Sense Multiple Access 1-persistent: sense, when free transmit propagation delay nonpersistent: slotted, random delay when slot busy p-persistent: transmit with probability p when slot is idle S (throughput per packet time) Pure ALOHA Slotted ALOHA 0.5-persistent CSMA 1-persistent CSMA 0.01-persistent CSMA Nonpersistent CSMA 0.1-persistent CSMA G (attempts per packet time) Chapter 4 p.13/69

14 CSMA with Collision Detection (CSMA/CD) Early transmission abort Random backoff Bounding the contention interval (2τ, where τ is propagation delay) t o Contention slots Frame Frame Frame Frame Transmission period Contention period Time Idle period Chapter 4 p.14/69

15 Collision-Free 1-bit reservation 8 Contention slots Frames 8 Contention slots 1 d issue: 1 bit per station Making the overhead logarithmic Bit time Result Stations 0010 and 0100 see this 1 and give up Station 1001 sees this 1 and gives up Chapter 4 p.15/69

16 Wireless LAN CSMA Hidden station (a C better not send to B) Exposed station (b C could send to D) A B C D A B C D Radio range (a) (b) Chapter 4 p.16/69

17 Wireless LAN Avoidance RTS / CTS Range of A's transmitter Range of B's transmitter C A RTS B D C A CTS B D E E (a) (b) Chapter 4 p.17/69

18 Topics Arbitrating access to broadcast networks Channel Allocation Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth Data Link Layer Switching Chapter 4 p.18/69

19 Ethernet Cabling Manchester Encoding MAC Sublayer Protocol Binary Exponential Backoff Performance Switched Ethernet Fast Ethernet Gigabit Ethernet Logical Link Control Retrospective Chapter 4 p.19/69

20 Ethernet Cabling Common Kinds of Cable 10Base5 vampire taps 10 Mbps, Baseband signaling, 500 meters 10Base2: BNC connectors Name Cable Max seg N/seg Advantages 10Base5 Thick coax 500 m 100 Original; now obsolete 10Base2 Thin coax 185 m 30 No hub 10Base-T Twisted pair 100 m 1024 Cheapest 10Base-F Fiber optics 2000 m 1024 Best between buildings Chapter 4 p.20/69

21 Ethernet Cabling Illustrating Kinds of Cable Controller Core Controller Transceiver cable Vampire tap Transceiver + controller Twisted pair Transceiver Connector Hub (a) (b) (c) (a) 10Base5, (b) 10Base2, (c) 10Base-T Chapter 4 p.21/69

22 Ethernet Cabling Cable Topologies A B C A B C D Tap D Repeater Backbone (a) (b) (c) (d) (a) Linear, (b) Spine, (c) Tree, (d) Segmented Chapter 4 p.22/69

23 Ethernet Manchester Encoding Transition on every bit, clock recovery Basic: 1 is high to low; 0 is low to high Differential: 0 has a transition at the start Requires 2x bandwidth +.85V, -.85V Bit stream (a) Binary encoding (b) Manchester encoding (c) Differential Manchester encoding Transition here indicates a 0 Lack of transition here indicates a 1 Chapter 4 p.23/69

24 Ethernet MAC Sublayer Protocol Frame Formats Bytes (a) Preamble Destination address Source address Type Data Pad Check- sum Destination Source (b) Preamble Length Data Pad address address Check- sum (a) DIX (Digital, Intel, Xerox) Ethernet, (b) IEEE Chapter 4 p.24/69

25 Ethernet Frame DIX Preamble: (* 8) 10-MHz square wave for 6.4 µsec Destination and Source addresses: 2 or 6 bytes (only 6 is used) Group addresses msb is 1 Broadcast all 1 s Bit 46 is used for local versus global address 48 2 bits for global addresses Types field specifies the upper level protocol Data 1500 byte maximum die to memory costs Pad: to ensure minimum length Checksum: CRC-32 Chapter 4 p.25/69

26 Ethernet MAC Sublayer Protocol Minimum Frame Size Packet starts Packet almost A B A B at time 0 at B at τ - (a) (b) A B A Noise burst gets back to A at 2τ B (c) Collision at time τ (d) Chapter 4 p.26/69

27 Ethernet MAC Sublayer Protocol Minimum Frame Size longest segment 500 m at most 4 repeaters maximum LAN length is 2500 m Maximum round-trip time is 50µsec 10 Mbps implies 100 nsec / bit, 500 bits takes 50 µsec uses 512 bits (64 bytes) as minimum frame size Chapter 4 p.27/69

28 Ethernet Binary Exponential Backoff Slots are defined to be 51.2µsec during contention period After i collisions, backoff random number of intervals between 0 and 2 i i is bounded at 10 after 16 attempts, the sender quits Intuition Assume that number of contending stations is small until proven otherwise if i were fixed at 1023, lots of unnecessary waiting if i were fixed at 1, potential for unbounded waiting 1 Chapter 4 p.28/69

29 Ethernet Performance Model Metcalfe and Boggs ignore binary exponential backoff and assume constant probability, p, of retransmission in each slot Probability that one station acquires a slot, A, is A kp 1 p k 1 where k p number of stations ready to transmit probability that a station will retransmit A is maximized when p is 1 k When p is 1 k, A 1 e as k Chapter 4 p.29/69

30 Ethernet Performance Size of Contention Window, w A A 1 j 1 is the probability that the contention window is j slots Mean number of slots per contention is: j 0 ja 1 Each slot is bounded by 2τ, so the mean window size is bounded by 2τ A Assuming optimal p (p 1 k), A 1 e and w A j 2τe 5 1 4τ 1 A Chapter 4 p.30/69

31 Ethernet Performance Efficiency Let P be the mean transmission time / frame Channel efficiency Let F B L c frame length bandwidth cable length speed of light P F B P P 2τ A and Channel efficiency As BL increases, efficiency decreases 1 1 2BLe cf Chapter 4 p.31/69

32 Ethernet Performance Efficiency 1.0 Channel efficiency byte frames 512-byte frames 256-byte frames 128-byte frames 64-byte frames Number of stations trying to send 2τ 51 2µsec, 10 Mbps Chapter 4 p.32/69

33 Switched Ethernet Connector Switch To hosts Ethernet Hub To hosts To hosts 10Base-T connection To the host computers collision domains Chapter 4 p.33/69

34 Fast Ethernet Cabling Name Cable Max seg Advantages 100Base-T4 Twisted pair 100 m Category 3 UTP 100Base-TX Twisted pair 100 m full duplex 100 Mbps category 5 100Base-TF Fiber optics 2000 m full duplex 100 Mpbs long runs Chapter 4 p.34/69

35 Gigabit Ethernet Ethernet Switch or hub Computer Ethernet (a) (b) (a) two-station Ethernet, (b) multistation Ethernet Chapter 4 p.35/69

36 Gigabit Ethernet It s not Ethernet Full duplex switched, no collisions not CSMA/CD segment length determined by signalling properties Half duplex hubs, collisions 100 times faster, 25 meter maximum length carrier extension hardware pad to 512 bytes (9% efficiency) frame bursting sender sends combined packets up to 512 bytes Chapter 4 p.36/69

37 Gigabit Ethernet Cabling Name Cable Max seg Advantages 1000Base-SX Fiber optics 550 m Multimode fiber (50, 62.5 microns) 1000Base-LX Fiber optics 5000 m Single (10µ) or multimode (50, 60.5 µ) 1000Base-CX 2 pairs of STP 25 m Shielded twisted pair 1000Base-T 4 pairs of UTP 100 m Standard cat 5 UTP Chapter 4 p.37/69

38 IEEE 802.2: Logical Link Control Network layer Packet Data link layer LLC MAC MAC LLC LLC Packet Packet MAC Physical layer Network (a) (b) (a) Position of LLC, (b) Protocol formats Chapter 4 p.38/69

39 Ethernet Retrospective Simple cheap, reliable, and easy to mainain Evolution Chapter 4 p.39/69

40 Topics Arbitrating access to broadcast networks Channel Allocation Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth Data Link Layer Switching Chapter 4 p.40/69

41 Protocol Stack Upper layers MAC sublayer Logical link control Data link layer Infrared FHSS DSSS a OFDM b HR-DSSS g OFDM Physical layer Chapter 4 p.41/69

42 Physical Layer a OFDM Othogonal Frequency Division Multiplexing up to 54 Mbps 52 frequencies: 48 for data, 4 for synchronization b HR-DSSS High Rate Direct Sequence Spread Spectrum 1, 2, 5.5, and 11 Mbps 7 times the range of a g (enhanced b) Chapter 4 p.42/69

43 MAC Sublayer Protocol Hidden and Exposed stations Radios are half duplex (can t listen while sending) Modes DCF Distributed Coordination Function PCF Point Coordination Function base station, polls for frames to send beacon frame CSMA/CA Chapter 4 p.43/69

44 Hidden and Exposed Stations A wants to send to B but cannot hear that B is busy Range of C's radio B wants to send to C but mistakenly thinks the transmission will fail Range of A's radio A B C A B C C is transmitting A is transmitting (a) (b) Chapter 4 p.44/69

45 Virtual Channel Sensing A RTS Data B CTS ACK C NAV D NAV Time Chapter 4 p.45/69

46 Fragment Burst Errors are related to fragment length Fragment burst A RTS Frag 1 Frag 2 Frag 3 B CTS ACK ACK ACK C NAV D NAV Time Chapter 4 p.46/69

47 Combining PCF and DCF Control frame or next fragment may be sent here SIFS PIFS DIFS PCF frames may be sent here DCF frames may be sent here Bad frame recovery done here EIFS ACK Time Chapter 4 p.47/69

48 Protocol Stack Bytes Frame control Dur- ation Address 1 Address 2 Address 3 Seq. Address 4 Data Check- sum Bits Version Type Subtype 1 To DS From DS MF Re- try Pwr More W O Frame control Chapter 4 p.48/69

49 Topics Arbitrating access to broadcast networks Channel Allocation Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless (skip) Bluetooth Data Link Layer Switching Chapter 4 p.49/69

50 Topics Arbitrating access to broadcast networks Channel Allocation Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth (skip) Data Link Layer Switching Chapter 4 p.50/69

51 Topics Arbitrating access to broadcast networks Channel Allocation Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth Data Link Layer Switching Chapter 4 p.51/69

52 Bridging LANs Example Bridge Backbone LAN B B B B File server Cluster on a single LAN Work- station LAN Chapter 4 p.52/69

53 Bridging LANs Reasons Autonomy: partitioning reflects political boundaries Geography: partitioning reflects geographic distance Load: partition to isolate load Distance: further than 2500 meters Reliability: limit the effect of a bad node Security: limit the spread of sensitive information (promiscuous mode) Chapter 4 p.53/69

54 Data Link Layer Switching Bridges from 802.x to 802.y Local Internetworking Spanning Tree Bridges Remote Bridges Repeaters, Hubs, Bridges, Switches, Routers, and Gateways Virtual LANs Chapter 4 p.54/69

55 Bridges from 802.x to 802.y Bridge Function Host A Host B Network Pkt Bridge Pkt LLC Pkt Pkt Pkt MAC Pkt Pkt Pkt Pkt Physical Pkt Pkt Pkt Pkt Wireless LAN Pkt Pkt Ethernet Chapter 4 p.55/69

56 Bridges from 802.x to 802.y Issues Different frame formats Destination Source Length Data Pad address address Check- sum Frame Dur- Address Address Address Address Seq. Data control ation Check- sum Header E C Type EK Length Connection ID Data C I CRC Check- sum Different data rates 100 Mbs to 11 Mbps many to one Chapter 4 p.56/69

57 Bridges from 802.x to 802.y Issues (continued) Different maximum frame sizes frames arrive in one piece or they don t no provision for fragmenting and reassembling frames MTU lacks transparency Security encryption on wireless, but not on Ethernet encrypt at higher layers Quality of service Chapter 4 p.57/69

58 Local Internetworking Transparent bridging of Local Ethernets F G H Bridge LAN 4 A B B1 C B2 D E LAN 1 LAN 2 LAN 3 For each frame, bridge decides to forward or discard Routing table in each bridge, local knowledge only Backward learning with decay Chapter 4 p.58/69

59 Spanning Tree Bridges Issue Multiple bridges in parallel Routing loops Frame copied by B1 Frame copied by B2 LAN 2 F 1 F 2 B1 Bridge B2 LAN 1 F Initial frame Build a tree, avoid loops, but ignore some possible links Chapter 4 p.59/69

60 Spanning Tree Bridges Sample Solution A B C A B C LAN D E F LAN D E F G Bridge H I J Bridge that is part of the spanning tree 5 6 H J Bridge that is not part of the spanning tree 8 9 (a) (b) Chapter 4 p.60/69

61 Spanning Tree Bridges Building the Tree Selecting a root node broadcast serial numbers select bridge with lowest serial number Construct a tree with shortest paths from root to every bridge Continue to run algorithm to detect changes in topology Chapter 4 p.61/69

62 Remote Bridges PPP Links Bridge Point-to-point line LAN 1 LAN 2 LAN 3 MAC frames as payload Strip MAC header and trailer and forward payload only (may miss errors in bridge memory) Chapter 4 p.62/69

63 Repeaters, Hubs, Bridges, Switches, Routers and Gateways Application layer Transport layer Application gateway Transport gateway Packet (supplied by network layer) Network layer Router Frame header Packet header TCP header User data CRC Data link layer Physical layer Bridge, switch Repeater, hub Frame (built by data link layer) (a) (b) Chapter 4 p.63/69

64 Hubs, Bridges, and Switches A B C D A B C D Host A B C D Hub Bridge Switch LAN E F G H (a) E F G H (b) E F G H (c) Cutthrough switches Chapter 4 p.64/69

65 Routers and Gateways Routers operate at the network layer strip off MAC header and trailer use destination address (e.g., IP) address in network header for routing Transport gateways connect networks using different transport protocols (e.g., TCP and ATM) Application gateways, e.g., to SMS messages Chapter 4 p.65/69

66 Virtual LANs Physical Topology may not match the logical organization Security, Load, Broadcast Cable duct Hub Corridor Switch Hub Twisted pair to a hub Office Chapter 4 p.66/69

67 Example VLANs Port versus MAC versus protocol or IP A B C D A B C D G W W W I J K G GW M I G N J G W B1 B2 S1 S2 GW G GW O K W W W M N O L GW L G 2 E F G H G W G G E F G H (a) (b) Chapter 4 p.67/69

68 802.1Q Being VLAN Aware Transition VLAN-aware end domain VLAN-aware core domain Legacy end domain Legacy PC Tagged frame Tagged frame VLAN- aware PC VLAN-aware switch Switching done using tags Legacy frame Chapter 4 p.68/69

69 802.1Q Frame Format Destination Source Length Data Pad address address Check- sum Destination Source 802.1Q Tag Length Data Pad address address Check- sum VLAN protocol ID (0x8100) Pri C F I VLAN Identifier Chapter 4 p.69/69

Medium Access Control Sublayer

Medium Access Control Sublayer Wireless (WLAN) Medium Access Control Sublayer Mahalingam Mississippi State University, MS October 20, 2014 Outline Medium Access Protocols Wireless (WLAN) 1 Medium Access Protocols ALOHA Slotted ALOHA

More information

Chapter 4. The Medium Access Control Sublayer

Chapter 4. The Medium Access Control Sublayer Chapter 4 The Medium Access Control Sublayer The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and

More information

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem. Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.

More information

Outline. EEC-484/584 Computer Networks. Multiple Access Protocols. Wireless LAN Protocols. Lecture 9. Wenbing Zhao

Outline. EEC-484/584 Computer Networks. Multiple Access Protocols. Wireless LAN Protocols. Lecture 9. Wenbing Zhao EEC-484/584 Computer Networks Lecture 9 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline Review Multiple access protocols IEEE 802

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 9 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review Multiple access protocols IEEE 802

More information

Outline. EEC-682/782 Computer Networks I. Multiple Access Protocols. IEEE 802 Standards

Outline. EEC-682/782 Computer Networks I. Multiple Access Protocols. IEEE 802 Standards EEC-682/782 Computer Networks I Lecture 9 Wenbing Zhao w.zhao1@csuohio.edu http://academic.csuohio.edu/zhao_w/teaching/eec682.htm (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB

More information

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008 Computer Networks Medium Access Control Mostafa Salehi Fall 2008 2008 1 Outline Issues ALOHA Network Ethernet Token Ring Wireless 2 Main Issues Local Area Network (LAN) : Three or more machines are physically

More information

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

More information

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation Broadcast Network Jaringan Komputer Medium Access Control Sublayer 2 network categories: point-to-point connections broadcast channels Key issue in broadcast network: how to determine who gets to use the

More information

Computer Networks. Medium Access Sublayer (Part I)

Computer Networks. Medium Access Sublayer (Part I) Computer Networks Medium Access Sublayer (Part I) Topics Introduction Multiple Access Protocols Ethernet Wireless LAN Protocols Bridges Misc (brief) High-Speed LANs Satellite Networks Introduction Remember,

More information

EE 122: Ethernet and

EE 122: Ethernet and EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts

More information

The Medium Access Control Sublayer

The Medium Access Control Sublayer The Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Static channel allocation Assumptions for dynamic Assumptions for Dynamic Channel Allocation 1. Independent traffic 2. Single channel

More information

Redes de Computadores. Medium Access Control

Redes de Computadores. Medium Access Control Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium

More information

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Medium Access Control Sublayer Chapter 4

Medium Access Control Sublayer Chapter 4 Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth RFID Data Link Layer Switching Revised: August 2011 & February

More information

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology Medium Access Control CSCI370 Lecture 5 Michael Hutt New York Institute of Technology The Data Link Layer Logical Link Control (LLC) IEEE 802.2 Standard RFC 1042 Provides three service options Unreliable

More information

Chapter 12 Multiple Access 12.1

Chapter 12 Multiple Access 12.1 Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

ECEN 5032 Data Networks Medium Access Control Sublayer

ECEN 5032 Data Networks Medium Access Control Sublayer ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:

More information

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection: 1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies

More information

Medium Access Control Sublayer Chapter 4

Medium Access Control Sublayer Chapter 4 Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth RFID Data Link Layer Switching Revised: August 2011 The

More information

Wireless Local Area Networks. Networks: Wireless LANs 1

Wireless Local Area Networks. Networks: Wireless LANs 1 Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application

More information

Direct Link Communication II: Wired Media. Multi-Access Communication

Direct Link Communication II: Wired Media. Multi-Access Communication Direct Link Communication II: Wired Media Multi-Access Communication Two classes: contention-based e.g., CSMA/CD, CSMA/CA used in Ethernet, WLAN contention-free e.g., TDM, FDM, TDMA, CDMA, token ring one

More information

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018 CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently

More information

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017 CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,

More information

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared

More information

Part3. Local Area Networks (LAN)

Part3. Local Area Networks (LAN) Part3 Local Area Networks (LAN) LAN Characteristics Small geographical area Relatively high data rate Single management Topologies Bus, star, ring Specifications at physical and data link layer mostly

More information

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 5. February 12 CMSC417 Set 5 1

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 5. February 12 CMSC417 Set 5 1 CSMC 417 Computer Networks Prof. Ashok K Agrawala 2012 Ashok Agrawala Set 5 February 12 CMSC417 Set 5 1 The Medium Access Control Sublayer February 12 CMSC417 Set 5 2 Medium Access Control Sublayer Channel

More information

COS 140: Foundations of Computer Science

COS 140: Foundations of Computer Science COS 140: Foundations of Computer Science ALOHA Network Protocol Family Fall 2017 Homework 2 Introduction 3 Network Protocols.......................................................... 3 Problem.................................................................

More information

Chapter 4 (Week 7) The Medium Access Control Sublayer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP CN&DC Dr.

Chapter 4 (Week 7) The Medium Access Control Sublayer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP CN&DC Dr. Chapter 4 (Week 7) The Medium Access Control Sublayer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP. 247-292 1 4.1. THE CHANNEL ALLOCATION PROBLEM 4.2. MULTIPLE ACCESS PROTOCOLS 4.3. ETHERNET

More information

Summary of MAC protocols

Summary of MAC protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,

More information

Networking Technologies and Applications

Networking Technologies and Applications Networking Technologies and Applications Rolland Vida BME TMIT September 23, 2016 Aloha Advantages: Different size packets No need for synchronization Simple operation If low upstream traffic, the solution

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed With relatively small bit errors Multiaccess Protocols Communication among

More information

Ethernet Basics. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers

Ethernet Basics. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers Ethernet Basics based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers Ethernet Basics History Ethernet Frames CSMA/CD Obsolete versions 10Mbps versions Segments Spanning Tree Protocol

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 6 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,

More information

Data and Computer Communications

Data and Computer Communications Data and Computer Communications Chapter 16 High Speed LANs Eighth Edition by William Stallings Why High Speed LANs? speed and power of PCs has risen graphics-intensive applications and GUIs see LANs as

More information

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr.

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr. Introductory to Computer Networks Local Area Networks Lecture 16 Fall 2010 Isfahan University of technology Dr. Faramarz Hendessi What is a LAN? Local area means: Private ownership freedom from regulatory

More information

Medium Access Protocols

Medium Access Protocols Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning

More information

Link Layer and Ethernet

Link Layer and Ethernet Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple

More information

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices

More information

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 5 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,

More information

Link Layer: Retransmissions

Link Layer: Retransmissions Link Layer: Retransmissions Context on Reliability Where in the stack should we place reliability functions? Application Transport Network Link Physical CSE 461 University of Washington 2 Context on Reliability

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Spring'15 1 Next week Announcements April 14: ICN (Spencer Sevilla) April 16: DTN

More information

Unit 7 Media Access Control (MAC)

Unit 7 Media Access Control (MAC) Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC

More information

COS 140: Foundations of Computer Science

COS 140: Foundations of Computer Science COS 140: Foundations of C S Network Protocol Family Fall 2017 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 25 Homework Homework Slides, book Chapter 24 on line Homework: All exercises

More information

Data Link Layer, Part 3 Medium Access Control. Preface

Data Link Layer, Part 3 Medium Access Control. Preface Data Link Layer, Part 3 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable

More information

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN RMIT University Data Communication and Net-Centric Computing COSC 1111/2061/1110 Medium Access Control Methods & LAN Technology Slide 1 Lecture Overview During this lecture, we will Look at several Multiple

More information

Ethernet. Typical Setup. Names. Operations. Operations Switch: No Collisions EECS 122. Hub: Single Collision Domain

Ethernet. Typical Setup. Names. Operations. Operations Switch: No Collisions EECS 122. Hub: Single Collision Domain Overview Physical Layer MAC Bridged VLAN Link Aggregation XON/XOFF 802.11 Summary Overview Typical Setup Names Operations Perspective TOC TOC Overview Typical Setup Names Structure [rate][modulation][media

More information

Data Link Layer, Part 5. Medium Access Control

Data Link Layer, Part 5. Medium Access Control CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU

More information

Link Layer and Ethernet

Link Layer and Ethernet Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple

More information

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4. Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,

More information

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer

More information

Direct Link Communication II: Wired Media. Multi-Access Communication

Direct Link Communication II: Wired Media. Multi-Access Communication Direct Link Communication II: Wired Media Multi-Access Communication Two classes: contention-based e.g., CSMA/CD, CSMA/CA used in Ethernet, WLAN contention-free e.g., TDM, FDM, TDMA, CDMA, token ring used

More information

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst EITF25 Internet Techniques and Applications L4: Network Access Stefan Höst Repetition The link layer protocol should make sure that the data is correctly transmitted over the physical link using error

More information

CS4516 Advanced Computer Networks. Final Review

CS4516 Advanced Computer Networks. Final Review Final Review ------------------------------ Final Material Begins Here --------------------------- V. Local Area Networks A. "The Channel Allocation Problem" 1. assumptions B. LAN Performance Notation

More information

Telecommunication Protocols Laboratory Course. Lecture 2

Telecommunication Protocols Laboratory Course. Lecture 2 Telecommunication Protocols Laboratory Course Lecture 2 Last time We began our study of telecommunication protocols at the Logical Link Control sub-layer (LLC) LLC issues Connectionless vs connection-oriented

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

CS 455/555 Intro to Networks and Communications. Link Layer

CS 455/555 Intro to Networks and Communications. Link Layer CS 455/555 Intro to Networks and Communications Link Layer Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs455-s13 1 Link Layer

More information

IEEE 802 LANs SECTION C

IEEE 802 LANs SECTION C IEEE 802 LANs SECTION C Outline of the Lecture Basic characteristics of LAN Topology Transmission Media MAC IEEE 802 LANs 802.3 - CSMA/CD based (Ethernet) 802.4 Token bus-based 802.5 Token ring-based Comparison

More information

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802. 4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data

More information

Lecture 4b. Local Area Networks and Bridges

Lecture 4b. Local Area Networks and Bridges Lecture 4b Local Area Networks and Bridges Ethernet Invented by Boggs and Metcalf in the 1970 s at Xerox Local area networks were needed to connect computers, share files, etc. Thick or Thin Ethernet Cable

More information

Distributed Queue Dual Bus

Distributed Queue Dual Bus Distributed Queue Dual Bus IEEE 802.3 to 802.5 protocols are only suited for small LANs. They cannot be used for very large but non-wide area networks. IEEE 802.6 DQDB is designed for MANs It can cover

More information

Lesson 2-3: The IEEE x MAC Layer

Lesson 2-3: The IEEE x MAC Layer Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

The Link Layer and LANs. Chapter 6: Link layer and LANs

The Link Layer and LANs. Chapter 6: Link layer and LANs The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple

More information

Data Communications. Data Link Layer Protocols Wireless LANs

Data Communications. Data Link Layer Protocols Wireless LANs Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

Ethernet. Computer Networks. Lecture 4.

Ethernet. Computer Networks. Lecture 4. Ethernet Computer Networks Lecture 4 http://goo.gl/pze5o8 The History of Ethernet Originally: DIX Ethernet (DEC-Intel-Xerox, Ethernet II) - 10Mbps. No LLC sublayer Later standardized as: IEEE 802.3 Frame

More information

College of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435

College of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435 College of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435 Student Name ID Time Allowed: 2.0 Hours. Closed Book, Closed

More information

COMP/ELEC 429/556 Introduction to Computer Networks

COMP/ELEC 429/556 Introduction to Computer Networks COMP/ELEC 429/556 Introduction to Computer Networks Broadcast network access control Some slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene Ng eugeneng

More information

Chapter 6 Medium Access Control Protocols and Local Area

Chapter 6 Medium Access Control Protocols and Local Area Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks Chapter Overview Broadcast Networks All information sent to all users No routing

More information

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018 WiFi Networks: IEEE 802.11b Wireless LANs Carey Williamson Department of Computer Science University of Calgary Winter 2018 Background (1 of 2) In many respects, the IEEE 802.11b wireless LAN (WLAN) standard

More information

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted

More information

CSE 461: Multiple Access Networks. This Lecture

CSE 461: Multiple Access Networks. This Lecture CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.

More information

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer 1 Wireless Local Area Networks (WLANs) The proliferation of laptop computers and other mobile devices (PDAs and cell phones)

More information

CSE 461 Multiple Access. David Wetherall

CSE 461 Multiple Access. David Wetherall CSE 461 Multiple Access David Wetherall djw@cs.washington.edu How to share a link Multiplexing = networking term for sharing a resource among multiple users (e.g., link, protocol instance) Topics: Multiplexing

More information

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD Review Error Detection: CRC Multiple access protocols Slotted ALOHA CSMA/CD LAN addresses and ARP Ethernet Some slides are in courtesy of J. Kurose and K. Ross Overview Ethernet Hubs, bridges, and switches

More information

CS 123: Lecture 12, LANs, and Ethernet. George Varghese. October 24, 2006

CS 123: Lecture 12, LANs, and Ethernet. George Varghese. October 24, 2006 CS 123: Lecture 12, LANs, and Ethernet George Varghese October 24, 2006 Selective Reject Modulus failure Example w = 2, Max = 3 0 0 1 3 0 A(1) A(2) 1 0 retransmit A(1) A(2) buffer Case 1 Case 2 reject

More information

Goal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste

Goal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste Goal and Outline 15-441 15-641 Computer Networking Lecture 3: Packet Switched Networks Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15 441 F16 Goal: gain a basic understanding of how you can build a

More information

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

standard. Acknowledgement: Slides borrowed from Richard Y. Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to

More information

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data

More information

Computer Networks. Wireless LANs

Computer Networks. Wireless LANs Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/

More information

Multiple Access in Cellular and Systems

Multiple Access in Cellular and Systems Multiple Access in Cellular and 802.11 Systems 1 GSM The total bandwidth is divided into many narrowband channels. (200 khz in GSM) Users are given time slots in a narrowband channel (8 users) A channel

More information

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Chapter 6 Medium Access Control Protocols and Local Area Networks 802.11 Wireless LAN CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Wireless Data Communications Wireless communications compelling

More information

Chapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010)

Chapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010) Chapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010) 6.3.2. Ethernet Ethernet was designed in the 1970s at the Palo Alto Research Center [Metcalfe1976]. The first prototype [5] used a coaxial

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Outline Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Layered Network Architectures - OSI framework descriptions of layers

More information

Data and Computer Communications. Chapter 11 Local Area Network

Data and Computer Communications. Chapter 11 Local Area Network Data and Computer Communications Chapter 11 Local Area Network LAN Topologies Refers to the way in which the stations attached to the network are interconnected Bus Topology Used with multipoint medium

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16 CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16 1 Final project demo Please do the demo next week to the TAs. So basically you may need

More information

MULTIPLE ACCESS PROTOCOLS 2. 1

MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.4: Multiple Access Protocols Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

More information

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD Page 1 Outline 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless Peter Steenkiste Data link fundamentals» And what changes in wireless Aloha Ethernet Wireless-specific

More information

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과. Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과 ahn@venus.uos.ac.kr Data Link Layer Goals: understand principles behind data link layer services: error detection, correction sharing a broadcast channel: multiple

More information

CS/ECE 439: Wireless Networking. MAC Layer Road to Wireless

CS/ECE 439: Wireless Networking. MAC Layer Road to Wireless CS/ECE 439: Wireless Networking MAC Layer Road to Wireless Multiple Access Media Media access Controlling which frame should be sent over the link next Easy for point-to-point links; half versus full duplex

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

IEEE standards for local area networks

IEEE standards for local area networks IEEE standards for local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS Standard for LANs 1 Copyright Quest opera è protetta

More information